Hey, there is no debug feature that can show you what the MX or MR is doing with packets internally and the flow logging on the MX also won't show matching or tagging data. So for this you would have to do some pcaps on for example the LAN port of the MX or the LAN port of the MR with the best filters to see how your traffic is being tagged upstream and downstream. These filters won't be hard to create since you have a nice table with ports to look for.
About the matching on port. That's a difficult one. I'm not 100% sure if you match on port if it matches both source or destination. And the localnet feature only supports IP addresses, not ports. So experimentation is key here.
If the traffic comes in untagged at the MX and you choose to tag it at the MR then for downstream traffic you will only be able to identify it using OTA (over the air) captures. To avoid any decrypting issues it is best to temporarily make an unsecured WLAN so you can actually see what's in the packets. You can actually decrypte pre-shared key packets if you captured the 4way handshake of that client however your capturing device must then capture the full packets which does not work on for example Ekahau capture what I use. I however tend to recognize the packets if you only use the one application on the endpoint while testing.
Since both MX and MR now can use NBAR I have to guess the application recognition would be identical so tagging the traffic on the MX is definitely a valid option.